Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2025, 22:34

General

  • Target

    JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe

  • Size

    315KB

  • MD5

    63a89e5ff68c266a8748347edf4dc531

  • SHA1

    aa0a6c1802871bb169a8c98437f7ba89e7e91265

  • SHA256

    191e4ed85957a0ee18d992a9c5c262708ff16e033d71a869cd15c1f4d4d506f5

  • SHA512

    7f34875baa0096050b553d3dec41ce90df3cac36853340c458d355ed3cc957a361b473b0cd340a485dfccfa59eac7992640a363db03b6d11f303a7420fd42561

  • SSDEEP

    6144:0gc//////tjEVTRXTuRLMJSZ25f+7z/IXioaf4v9WZ8bq/Wc+QUh4/ph:Tc//////eVlXTwMJb+7rIXioFW2nc+KP

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4684aea692cc47a9e2acb6d946feed02

    SHA1

    f9072f5646b3451f5b32a25f5109baba965c3bff

    SHA256

    3fcb2cff5544707d2a6d95e9e2e7910a7d6b7b3cc400a68913696fafd6fc4aba

    SHA512

    261666c67ec0c9aabeab9a575b73f1f13e4298a5b83b7dac44a3621ee30337cbcdee78e8984deab773a856f39fb44595e99f45c6487aa519c3f44cde7b895969

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9b00e21a4e2886d47c945bdb396d2fc

    SHA1

    34a9d32ac0ef99ba28160d07e00872800bebb380

    SHA256

    ee45ecf6ded1dd981f92e5642462c9f066f61fa0b85fa2966d9d825a21941bdf

    SHA512

    648b2a1e7c32bb78021f7f2ea4c23b8099c1dabdba0b574b4f1a428bf43e496b117555a35ccd309778092e91d7c6ea458dbe9ca9184691873e9b9584bd5c3d8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1d5ef5a80f8022e23f01cc015b78dc8

    SHA1

    8a9bbb7a8ec188fd2c33502ca891cdbba6eed4b6

    SHA256

    4669535fffd06d883b44719138e65834be49f92d04d3815a2b3b3265af8564a3

    SHA512

    f3169541022eb4ce6f62754b703aea20a8b56af565511b7ac372b4193699d2458071dfaf54797b98aec0d834a5a228d4f67ea8e7af3e070215815b900d64db3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8e520d342c6f8795a0d39442684b750

    SHA1

    102bfe12974ead87a23236ea9b71316a784f3a64

    SHA256

    66d7220175a6a235a56a1650e512a6b94b61ab3a378b35b8353357b2166ed077

    SHA512

    baf715616b0a4ecf312f10499d513837a5a76c65bab00cd5b33be168dceacc9f7c45e9f52f8683326608d4d88ef8c1277ae111816f79c8c4fe43303a5c7284d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78ba2cf27ffcff78155266613c985dcd

    SHA1

    b3cd1b240778f14c3fe1ab069fdbb1c68ba45d75

    SHA256

    329d614e02fef76116f4ceeb830089d559074227a6d8d64a1c85490319c72ae4

    SHA512

    a005d6a4407c77f996d92d5200df6efaea55a085a12a0c13d388b59e46aa45777fcb1c82de3e5e49b44ddde15f367e521f867eb407c81f482e0808c43b63a7d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0809dc0957d892aba8a8d8311aa718db

    SHA1

    2b4e0b6364d10a06f477c0b1efd0029cd111a956

    SHA256

    f8bdb55ba107c68a3697188f71124186f6f4d7b6967e9b89869ba3b164ab8260

    SHA512

    1686edc5c4b171daa0e713051fad60134dea0cd3701842dc8bf1ef74c03fccb3d185ed6af73ce07e79e72be40052d4a0f241a8d39580a52e3ce932b18b731444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c1bc45a8a0503ba5ef6374e98c8e49f

    SHA1

    ff9758377072a31eaff91cc4998aed09e5729c9f

    SHA256

    4a0d9831c10e50b1d08b9b8dda37eda9613af379e5e925abe2a84cf8b9815fe2

    SHA512

    dbd8c48ee5142d756f69e6c6b226dda91e9c6ec1ee30606a7c31df6def1eb96cefa44ea65d0ae912a1be858b7a2994b82966baff8204d22771dd56f10a482685

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f92f87c6fe1d6ec2e8cf65e8119bb2b5

    SHA1

    696cf4e90f64f4f55ed35cf45d5decd957a1ad33

    SHA256

    171fbfb388d89f4c18c6f6d40e87d13428f389dbf4e3d9fb5bb8c88f93d68a17

    SHA512

    4273f21a7f3aed85246341ea786e827dd236685ff5e16c07ab6bf88b334a1c6b7802df96d05981dc57d9e34239ac86f0f1bcda30155614fd964711ce080eff51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    838d2a255eeb6bdc6f127150c3ab2f46

    SHA1

    d2809e809c881fbe7a3cf26a2ed2c870d9991701

    SHA256

    63d3ee7ac55a45f20fa22d8908f50922a085ee773bfec7ba767337018d65c89f

    SHA512

    d300c5adfe0d2bc8d8a5f783d47a8afa0051e0c4ef24c08d93d118f02f50f316927c69e875ba884b0e8e067f169821a7f628fae41eb02a6bc5f454a9b9cdcb87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a78ced4c3bd550806e0e43a83dc3357

    SHA1

    339c993a6c48e31f9a7f5fd694b8f5172b29428b

    SHA256

    ff99c7fa87b998ab75423c59fcdee1fbf7bdc214368c93fe323f40efa813baf0

    SHA512

    f5ff9c7fc298f4e311968f385d5e5910de95ef40609ebc8f3a189fe186a3ddfecf924ab22bbbb6cb147585f6577ece79550e66e8662340da2b47d2dbe634e566

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e19ba16cbf3db3e25828ae8fd42936e7

    SHA1

    75c92fce4ee05e9d541abdcd4ec9331812188af2

    SHA256

    12c2d6961be07fc104095ae0238b35490f4e26eb5ae5779fede60abeb64e17c9

    SHA512

    f6801ee6d4c796d27de6e1fddba6951607611975ae59a5d89acf525cb766602b44d53394936b343d57f59db93b7b3bf9f2706055083b7b80d4087d18bd67f702

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0b6ed1a13ecdd16676f8bde234da849

    SHA1

    8422326e185cacc5c99813228ed26399dc982477

    SHA256

    56d3853dd3e4f48feb60462c77a4b7584573add51618a3b980dee3dfaaf74f7f

    SHA512

    1639dc8c33a0d57ddad5c33fb87f8cbf1af4a77d50f5b0348391304477d8b8aec8493b51bbd89e1063cc3b43632c5e5cd7866d7779419030fe61216e3371637a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    943303b13a1a6d7c71f854c08cb17b82

    SHA1

    9df13cd5819d0ed9d68386e3755aa99fa0384cc1

    SHA256

    e39d4b64bc19fb883c9fd15e039c04b6fd6f988333438c303b9966fdb6af1a11

    SHA512

    cc0df289a30f175b448a2dd28717d3b0dc09539f21addf92053cfc136cd3ef4082e5a0f5b12c180c2d92ea784515ada5671036f5b99a3a7e2f739135623c6f9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5dfd25738bc00a213afe589204370c79

    SHA1

    e843b779ed4bd5b61b49916475ceed13b18e11c9

    SHA256

    5b8b9d203a26fdaa9d492faf899ed11498e807e94c9fad202fcd48e53b216629

    SHA512

    3250ff21d3844ce52a3f58232550e7b901186a286478dacd7ebb9cb23525361b15e9719c8e9d72bd8d07feb4b3654295177a36d3ea1467f8ae9ea9c3329317c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3bb52d928aed1f29d24f46161262b14

    SHA1

    da2f90b649b6a6722ba5d895ba61ac04777673ff

    SHA256

    717cc7c938597f14d96756a8237325b06051fabea3a8298fab0a5575e1d98966

    SHA512

    83758444ca03455ae10ed8f5dda4a67fdd5c6f92a9ab6b513da69672c53c18ad1e07688133bfe52e46c834a67982d5fafef589a130b6ae51ae3fb8c49ac4e086

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc044a6ac27283f9468f5a0d1948d00d

    SHA1

    897162ef51b6090e0ee5c33887723f25566a7845

    SHA256

    8fabc8a6f1a59b320bf05abdc2bf179d0d6021788ed1bafee106e6ebeefaf3db

    SHA512

    235df188df2114d527a0f15c53e2caaaae1dbb9d189f4ed318339b796e0bd7085312611eb888c2ff09351a51263a9b936ace42803a86306f165e95bcd1a577fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57d8e3adab4d7ce471825bfed855ff6e

    SHA1

    6b2fed496372dc9d8c30b5aa16ce6d9ac80ec110

    SHA256

    0258ba6747ce8f80beeb1a0267d63fa4f377c09ae13f5a548ec62e7438436033

    SHA512

    8a1648a8aadd347da01ab130b976f10416dede7fd0d768cf43ac01bcf18060ae7a55f808ae10b44f1c2803e2ee06aa660500a1b432ca3f82fb08ecdc8248f0e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99ec968174f15d1019c5094dbc4fe881

    SHA1

    c2d3559d4554a9e6929630d0c6bb10f39b73340f

    SHA256

    79d8ca30e451bc8e8df26c8bed6d916faeed42df7489cfba652958a66c7e290a

    SHA512

    45724e8c7142daee57443f9eb6781d2aa4b31c809f259db6d219c4db1d25d503a33e428a30dea1b064fa85215af769b77cb5ef3de3bba9af46d17eb2f2e60511

  • C:\Users\Admin\AppData\Local\Temp\Cab7CE0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar87FB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2196-13-0x0000000000160000-0x00000000001B6000-memory.dmp

    Filesize

    344KB

  • memory/2872-17-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2872-6-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2872-2-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2872-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2872-7-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2872-4-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2872-8-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2872-11-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2872-15-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2872-10-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2872-9-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2896-5-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB